It's broken us into the key sections - details, a visual tree of the structure, the logic tree and relationships, and, finally the source code. It's a pretty simple process of creating the menu and appending the elements onto it, much like a normal drop down menu. The key is in the set_submenu function, creating a new object for the code to append the submenu elements to. The rest is just simple appends.

It's broken us into the key sections - details, a visual tree of the structure, the logic tree and relationships, and, finally the source code. It's a pretty simple process of creating the menu and appending the elements onto it, much like a normal drop down menu. The key is in the set_submenu function, creating a new object for the code to append the submenu elements to. The rest is just simple appends.

In his latest post, Chris Shiflett links to more information from Andrew van der Stock about his proposed PHP security architecture.

Andrew van der Stock has started providing more details about a proposed security architecture for PHP, beginning with the SABSA (Sherwood Applied Business Security Architecture) approach. This approach is broken down into layers:

Contextual

Conceptual

Logical

Physical

Component

He describes each of these layers and how they relate to PHP, and he also hints that more details are coming.

Andrew's post, a follow-up from previousposts, maps out the structure above visually, and provides this link to a book published dealing with a business-driven security approach...

In his latest post, Chris Shiflett links to more information from Andrew van der Stock about his proposed PHP security architecture.

Andrew van der Stock has started providing more details about a proposed security architecture for PHP, beginning with the SABSA (Sherwood Applied Business Security Architecture) approach. This approach is broken down into layers:

Contextual

Conceptual

Logical

Physical

Component

He describes each of these layers and how they relate to PHP, and he also hints that more details are coming.

Andrew's post, a follow-up from previousposts, maps out the structure above visually, and provides this link to a book published dealing with a business-driven security approach...